Jari, Thanks for the suggestion. Does this reduce the security of the multi-key encryption (storing the key locally with the data)? How would you compare this with single key encryption with key stored remotely? Daniel. On Sun, 14 Mar 2004, Jari Ruusu wrote: <snip> > You can still use > > ssh user@host cat keyfile | mount -p 0 -o gpgkey=/etc/foo > > that uses /etc/foo key file that _is_ stored locally, but if that key file > is gpg encrypted with password like > > P+zl9O2QYxJZcgMO94+IN9ezfjf/BVQsNEOXajbWRnO2ok/FLQDD8zCsDDyT > > that you pipe through ssh to mount. What is the problem with that? > > -- > Jari Ruusu 1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9 DB 1D EB E3 24 0E A9 DD > > > - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/